CIS Logo
tagline: Confidence in the Connected World


Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution.



Tony Sager discusses the way that the COVID-19 pandemic is changing the cybersecurity market and the cybersecurity industry.


Multiple vulnerabilities have been discovered in PHP, the most severe of which could allow for a denial-of-service condition.



This is a critical moment for government and corporate America to come together to protect U.S. cyber resources and critical infrastructure.


In April 2020, the MS-ISAC found the Top 10 Malware variants comprised 53% of Total Malware activity, which is up from 42% in March.


Multiple vulnerabilities have been discovered in Palo Alto PAN-OS, the most severe of which could allow for session fixation attacks.



States remain broadly supportive of a cybersecurity grant program, especially as the COVID-19 pandemic has forced government employees to work from home.


Implementing foundational cybersecurity best practices provides peace of mind when moving to the cloud, ensuring that organizations start and stay secure.


Multiple vulnerabilities have been discovered in Adobe Acrobat and Adobe Reader, the most severe of which could allow for arbitrary code execution.



Multiple vulnerabilities have been discovered in Microsoft products, the most severe of which could allow for remote code execution.



Learn about the updates and improvements that were made to the CIS Oracle Database 12c Benchmark and CIS Microsoft Windows Benchmarks.


Multiple vulnerabilities have been discovered in VMware’s vRealize Operations Manager (vROP), the most severe of which could allow for arbitrary code execution.



A vulnerability has been discovered in the Elementor Pro Plugin that could allow for remote code execution.



The audit recommends that the OSP finish implementing the six CIS controls it was reviewed for and develop a security management and compliance program.


Multiple vulnerabilities have been discovered in Cisco Products, the most severe of which could allow for directory traversal attacks.



1 3 4 5 6 7 125